Friday, June 21, 2013

HACKERS EVERYWHERE



Guys today I thought to post some different but much crucial thing in my blog. Here I would like to give you some guidelines to protect from hacking threats and other internet related security threats.  Because now actually we spend half of  our life time with internet so it’s better to have some knowledge on Hacking and other security issues that we have to face within our routine internet life. The content that I shared here, I got through practicing as a little punk but not as a great hacker or a victim of a hacker.
Before learning the strategies to avoid from hacking you should have at least basic understanding on hacking methods. So here I would like to give you the basic understanding on hacking methods which are widely use to hack social network profiles and emails.( Can you guys remember we learnt some of these things in our 1st year 2nd semester? There were few interesting areas like Vandalism, Phishing, Internet profiling, etc.)

Phishing

Phishing is the most widely using method to hack email accounts and social profiles. It’s an easy method to implement so the numbers of phishing victims are damn high. If you want hack some ones account using phishing method you have to follow few steps. First you should save the clone page of the email account index or social network page index. Here I take Facebook as an example. So the first thing you should do is log on to fb and save the index page as html file. Secondly you have to do some alteration to this saved web index’s html script in order to save the victim’s password and user name on your hosting account (if you want to find that alteration Google it or you can find already altered indexes for the phishing purpose) thirdly crate a hosting account you can create a free hosting account (E.g-100mb.com, 000.com). Then upload your EDITED FB INDEX file to this hosting website, and finally you can send this fake index link to your victim’s email or fb inbox by fabricating a cunning story in order to make them log in through that fake link. (But the browser address bar will indicate the original URL) so if that person has little bit knowledge on these thing you will be never able to hack that account.
Guidelines for avoid from Phishing
  •          Don’t click on the suspicious links that come through anonymous mails or direct messages
  •          Always look at the address bar on your web browser and make sure that you are log in to the original web page. (fake hostings are easily identifiable)
  •          Set shttp  settings for your web browser and profiles
  •          Install a proper internet security software


    Key loggers

    Key loggers are in two forms as internal key loggers and remote key loggers. Both the key loggers record your all key strokes (what you type on your computer) but you may never see those key loggers are running. Those are hidden applications. ACTUAL SPY is a good example for an internal key logger. If you want to take some ones details you can simply install this to your computer and hide then allow someone to log in internet via your computer. Remote key loggers are installed secretly in your computer without your consent. But your all keystrokes are recorded in some remote location (hacker’s computer) via Internet.
Guidelines for avoid from Key loggers
  •          Don’t use suspicious computers to browse internet
  •          If you’re log in from internet café check the task manager and see in applications and process. Check whether any suspicious program is running.
  •             Guys be careful if you log in to the internet by using your office computer there can be monitoring systems to record your all browsing activities I am sure the prestigious organization that you work will not do these things but if you network administrator want it he can easily hack you with his office network privileges.
  •          Use personal devices to browse the internet much as possible.
  •          Install a proper internet security system and update it.


     Spy ware

     Spy wares are harmful programs that secretly installed in your computer and work as a spy. All the activities that you do with your computer will be recorded in some other location through the spy ware. These programs are automatically come with some programs and landing on your hard disk without your approval.
Guidelines for avoid from spy ware
  •              Don’t install suspicious softwares to your computer
  •          Install and update an internet security program to block spyware and other malicious programs.


Other major guidelines for avoid from hacking threats
  •  Be careful when using FIREFOX browser because if you tick the remember the password tab the     password and user name can be easily obtain through security options of the browser.
  • Always remember to sign out your log ins (especially when you log in through lab , internet café or  a someone’s computer)
  •  Use proper security questions to secure your social network profiles and email accounts.
  •  Don’t use simple passwords, always make password with a mix of letters and numbers.
  •  Don’t save your security details like passwords and usernames inside your mobile phone.




I think above explanations are good enough to being avoid from hacking. So now hacking is an Illegal thing even in Sri Lanka. Some laws have been imposed very recently. But hackers are still there so be careful. My personal advice is don’t hack others. And don’t be a victim as well. After being hacked your entire life will be adversely affected. Finally one of Sri Lankan celebrities after being hacked behave like this lol
         after being hacked the best thing to do is not threatening the hacker inform it to relevant authorities .
       

0 comments: